SlideShare a Scribd company logo
1 of 9
Download to read offline
Classical encryption techniques
Science of secret-overview
Conventional Encryption  Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conventional encryption requirements ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conventional Encryption  Principles
Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attacks on conventional encryption system ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Average time required for exhaustive  key search  2.15 milliseconds 2 32  = 4.3 x 10 9 32 5.9  x  10 30   years 2 168  = 3.7 x 10 50 168 5.4 x 10 18   years 2 128  = 3.4 x 10 38 128 10 hours 2 56  = 7.2 x 10 16 56 Time required at 10 6  Decryption/ µs Number of Alternative Keys Key Size (bits)
Types of cryptanalysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodelpriyapavi96
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security EncryptionJoel Briza
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...JAINAM KAPADIYA
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryptionRashmi Burugupalli
 
Classic Information encryption techniques
Classic Information encryption techniquesClassic Information encryption techniques
Classic Information encryption techniquesJay Nagar
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityRamki M
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniquesShubham Jain
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Mohamed Loey
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Mohamed Loey
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniquesvinitha96
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquessaqib1611
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:Asad Ali
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network SecurityDr. Rupa Ch
 
Cryptography Introduction
Cryptography IntroductionCryptography Introduction
Cryptography Introductionindupps
 

What's hot (20)

Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
 
Classic Information encryption techniques
Classic Information encryption techniquesClassic Information encryption techniques
Classic Information encryption techniques
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Cryptography
CryptographyCryptography
Cryptography
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
Cryptography Introduction
Cryptography IntroductionCryptography Introduction
Cryptography Introduction
 

Viewers also liked

Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Ram Dutt Shukla
 
Navigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaNavigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaClientSide
 
Anninhmang K13 Mtt
Anninhmang K13 MttAnninhmang K13 Mtt
Anninhmang K13 MttQuynh Khuong
 
December report small
December report smallDecember report small
December report smallLisa Testart
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and CryptographyTalha SAVAS
 
выхадные в тбилиси
выхадные в тбилисивыхадные в тбилиси
выхадные в тбилисиMaia Odisharia
 
CV - Criar Valor ou Criar Volume
CV - Criar Valor ou Criar VolumeCV - Criar Valor ou Criar Volume
CV - Criar Valor ou Criar VolumeRui Ventura
 
Q U E S T The Book Final
Q U E S T The Book   FinalQ U E S T The Book   Final
Q U E S T The Book FinalRajesh Menon
 
Sreerag web services - universal data access
Sreerag web services - universal data accessSreerag web services - universal data access
Sreerag web services - universal data accessSreerag Gopinath
 
Perceptions Of Hispanic Offenders Toward Reentry Programs
Perceptions Of Hispanic Offenders Toward Reentry ProgramsPerceptions Of Hispanic Offenders Toward Reentry Programs
Perceptions Of Hispanic Offenders Toward Reentry Programsmgmoggio
 
Skf in brief_2009_sv
Skf in brief_2009_svSkf in brief_2009_sv
Skf in brief_2009_svSKF
 
Mett hoogwaterbeschermingsprogramma hetnieuwecommuniceren_v2
Mett hoogwaterbeschermingsprogramma hetnieuwecommuniceren_v2Mett hoogwaterbeschermingsprogramma hetnieuwecommuniceren_v2
Mett hoogwaterbeschermingsprogramma hetnieuwecommuniceren_v2Jeroen Rispens
 

Viewers also liked (20)

Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
 
Navigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaNavigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In Florida
 
Classical cipher
Classical cipherClassical cipher
Classical cipher
 
Cryptography
Cryptography Cryptography
Cryptography
 
Anninhmang K13 Mtt
Anninhmang K13 MttAnninhmang K13 Mtt
Anninhmang K13 Mtt
 
December report small
December report smallDecember report small
December report small
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
выхадные в тбилиси
выхадные в тбилисивыхадные в тбилиси
выхадные в тбилиси
 
World War II
World War IIWorld War II
World War II
 
CV - Criar Valor ou Criar Volume
CV - Criar Valor ou Criar VolumeCV - Criar Valor ou Criar Volume
CV - Criar Valor ou Criar Volume
 
Q U E S T The Book Final
Q U E S T The Book   FinalQ U E S T The Book   Final
Q U E S T The Book Final
 
eAudio
eAudioeAudio
eAudio
 
Sreerag web services - universal data access
Sreerag web services - universal data accessSreerag web services - universal data access
Sreerag web services - universal data access
 
giftee@NCC2010
giftee@NCC2010giftee@NCC2010
giftee@NCC2010
 
Perceptions Of Hispanic Offenders Toward Reentry Programs
Perceptions Of Hispanic Offenders Toward Reentry ProgramsPerceptions Of Hispanic Offenders Toward Reentry Programs
Perceptions Of Hispanic Offenders Toward Reentry Programs
 
Skf in brief_2009_sv
Skf in brief_2009_svSkf in brief_2009_sv
Skf in brief_2009_sv
 
Ehsan1019
Ehsan1019Ehsan1019
Ehsan1019
 
Ror caching
Ror cachingRor caching
Ror caching
 
WWI Comes To An End
WWI Comes To An EndWWI Comes To An End
WWI Comes To An End
 
Mett hoogwaterbeschermingsprogramma hetnieuwecommuniceren_v2
Mett hoogwaterbeschermingsprogramma hetnieuwecommuniceren_v2Mett hoogwaterbeschermingsprogramma hetnieuwecommuniceren_v2
Mett hoogwaterbeschermingsprogramma hetnieuwecommuniceren_v2
 

Similar to Cns Chapter 2

Chapter 2 part 1.ppt
Chapter 2 part 1.pptChapter 2 part 1.ppt
Chapter 2 part 1.pptMikiAbera
 
Information and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysisInformation and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysisVaibhav Khanna
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Anas Rock
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2koolkampus
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdfSetiya Nugroho
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and securitysangusajjan
 
symmetric cipher model.pptx
symmetric cipher model.pptxsymmetric cipher model.pptx
symmetric cipher model.pptxAjaykumar967485
 
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom EC-Council
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comphanleson
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneSecurityTube.Net
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackMona Rajput
 

Similar to Cns Chapter 2 (20)

Unit 1
Unit 1Unit 1
Unit 1
 
Chapter 2 part 1.ppt
Chapter 2 part 1.pptChapter 2 part 1.ppt
Chapter 2 part 1.ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
Information and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysisInformation and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysis
 
Day5
Day5Day5
Day5
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Cryptography
CryptographyCryptography
Cryptography
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
 
Ppt cns
Ppt cnsPpt cns
Ppt cns
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and security
 
symmetric cipher model.pptx
symmetric cipher model.pptxsymmetric cipher model.pptx
symmetric cipher model.pptx
 
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.com
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic Attack
 

More from Ram Dutt Shukla (20)

Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Shttp
ShttpShttp
Shttp
 
Web Security
Web SecurityWeb Security
Web Security
 
I Pv6 Addressing
I Pv6 AddressingI Pv6 Addressing
I Pv6 Addressing
 
Anycast & Multicast
Anycast & MulticastAnycast & Multicast
Anycast & Multicast
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Retransmission Tcp
Retransmission TcpRetransmission Tcp
Retransmission Tcp
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Tcp Immediate Data Transfer
Tcp Immediate Data TransferTcp Immediate Data Transfer
Tcp Immediate Data Transfer
 
Tcp Reliability Flow Control
Tcp Reliability Flow ControlTcp Reliability Flow Control
Tcp Reliability Flow Control
 
Tcp Udp Notes
Tcp Udp NotesTcp Udp Notes
Tcp Udp Notes
 
Transport Layer [Autosaved]
Transport Layer [Autosaved]Transport Layer [Autosaved]
Transport Layer [Autosaved]
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
T Tcp
T TcpT Tcp
T Tcp
 
Anycast & Multicast
Anycast & MulticastAnycast & Multicast
Anycast & Multicast
 
Igmp
IgmpIgmp
Igmp
 
Mobile I Pv6
Mobile I Pv6Mobile I Pv6
Mobile I Pv6
 
Mld
MldMld
Mld
 

Recently uploaded

BADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptx
BADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptxBADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptx
BADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptxvillenoc6
 
PATH-FIT-2-MODULE-5- BASIC EXERCISE CORE.pptx
PATH-FIT-2-MODULE-5- BASIC EXERCISE CORE.pptxPATH-FIT-2-MODULE-5- BASIC EXERCISE CORE.pptx
PATH-FIT-2-MODULE-5- BASIC EXERCISE CORE.pptxStephaniehooben2
 
A Comprehensive Review of 91 Club Online Money Making
A Comprehensive Review of 91 Club Online Money MakingA Comprehensive Review of 91 Club Online Money Making
A Comprehensive Review of 91 Club Online Money MakingWP Tech
 
Poland VS Austria Euro 2024 Squad Michał Probierzs Selection.docx
Poland VS Austria Euro 2024 Squad Michał Probierzs Selection.docxPoland VS Austria Euro 2024 Squad Michał Probierzs Selection.docx
Poland VS Austria Euro 2024 Squad Michał Probierzs Selection.docxWorld Wide Tickets And Hospitality
 
Benifits of Individual And Team Sports-Group 7.pptx
Benifits of Individual And Team Sports-Group 7.pptxBenifits of Individual And Team Sports-Group 7.pptx
Benifits of Individual And Team Sports-Group 7.pptxsherrymieg19
 
PGC _ 3.1 _ Powerpoint (2024) scorm ready.pptx
PGC _ 3.1 _ Powerpoint (2024) scorm ready.pptxPGC _ 3.1 _ Powerpoint (2024) scorm ready.pptx
PGC _ 3.1 _ Powerpoint (2024) scorm ready.pptxaleonardes
 
Resultados 20 KMS "Podebrady" Walking 2024
Resultados 20 KMS "Podebrady" Walking 2024Resultados 20 KMS "Podebrady" Walking 2024
Resultados 20 KMS "Podebrady" Walking 2024Judith Chuquipul
 
JORNADA 2 LIGA MUROBASQUETBOL1 2024.docx
JORNADA 2 LIGA MUROBASQUETBOL1 2024.docxJORNADA 2 LIGA MUROBASQUETBOL1 2024.docx
JORNADA 2 LIGA MUROBASQUETBOL1 2024.docxArturo Pacheco Alvarez
 
20240408 Bending Backwards to the Second Step Up.docx
20240408 Bending Backwards to the Second Step Up.docx20240408 Bending Backwards to the Second Step Up.docx
20240408 Bending Backwards to the Second Step Up.docxSharon Liu
 
Project & Portfolio, Market Analysis: WWE
Project & Portfolio, Market Analysis: WWEProject & Portfolio, Market Analysis: WWE
Project & Portfolio, Market Analysis: WWEDeShawn Ellis
 

Recently uploaded (10)

BADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptx
BADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptxBADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptx
BADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptx
 
PATH-FIT-2-MODULE-5- BASIC EXERCISE CORE.pptx
PATH-FIT-2-MODULE-5- BASIC EXERCISE CORE.pptxPATH-FIT-2-MODULE-5- BASIC EXERCISE CORE.pptx
PATH-FIT-2-MODULE-5- BASIC EXERCISE CORE.pptx
 
A Comprehensive Review of 91 Club Online Money Making
A Comprehensive Review of 91 Club Online Money MakingA Comprehensive Review of 91 Club Online Money Making
A Comprehensive Review of 91 Club Online Money Making
 
Poland VS Austria Euro 2024 Squad Michał Probierzs Selection.docx
Poland VS Austria Euro 2024 Squad Michał Probierzs Selection.docxPoland VS Austria Euro 2024 Squad Michał Probierzs Selection.docx
Poland VS Austria Euro 2024 Squad Michał Probierzs Selection.docx
 
Benifits of Individual And Team Sports-Group 7.pptx
Benifits of Individual And Team Sports-Group 7.pptxBenifits of Individual And Team Sports-Group 7.pptx
Benifits of Individual And Team Sports-Group 7.pptx
 
PGC _ 3.1 _ Powerpoint (2024) scorm ready.pptx
PGC _ 3.1 _ Powerpoint (2024) scorm ready.pptxPGC _ 3.1 _ Powerpoint (2024) scorm ready.pptx
PGC _ 3.1 _ Powerpoint (2024) scorm ready.pptx
 
Resultados 20 KMS "Podebrady" Walking 2024
Resultados 20 KMS "Podebrady" Walking 2024Resultados 20 KMS "Podebrady" Walking 2024
Resultados 20 KMS "Podebrady" Walking 2024
 
JORNADA 2 LIGA MUROBASQUETBOL1 2024.docx
JORNADA 2 LIGA MUROBASQUETBOL1 2024.docxJORNADA 2 LIGA MUROBASQUETBOL1 2024.docx
JORNADA 2 LIGA MUROBASQUETBOL1 2024.docx
 
20240408 Bending Backwards to the Second Step Up.docx
20240408 Bending Backwards to the Second Step Up.docx20240408 Bending Backwards to the Second Step Up.docx
20240408 Bending Backwards to the Second Step Up.docx
 
Project & Portfolio, Market Analysis: WWE
Project & Portfolio, Market Analysis: WWEProject & Portfolio, Market Analysis: WWE
Project & Portfolio, Market Analysis: WWE
 

Cns Chapter 2